Which of the following tools should the penetration tester use?